Explain cpu based exchange, Computer Engineering

Assignment Help:

Explain CPU based exchange.

CPU Based Exchange: All the control equipment is replaced with a single processor that must be quite powerful, in centralized control. This should be able of processing 10 to 100 calls per second, depending upon the load on the system, and performing simultaneously of many other ancillary tasks. A usual control configuration of an ESS by using centralized SPC is demonstrated in figure. A centralized SPC configuration may utilize more than one processor for redundancy reasons. Though, there are a large number of services that can be offered by CPU based exchange, they might be grouped under four wide categories.

1157_Typically CPU Based Exchange.png

FIG - Typically CPU Based Exchange

1. Services related with the calling subscribers and designed to decrease the number of dialing errors and the time spent on dialing.

2. Services related with the called subscriber and designed to raise the call completion rate.

3. Services including more than two parties.

4. Various types of services.

These new services are termed as supplementary services and several of the prominent ones are given below as:

 Category 1:

  • Recorded number calls or no dialing calls
  • Abbreviated dialing
  • Call back while free.

Category 2:

  • Operator answer.
  • Call forwarding

Category 3:

  • Call waiting
  • Calling number record
  • Conference calls.
  • Consultation hold

Category 4:

  • STD barring
  • Automatic alarm
  • Malicious call tracing

Issues commands of a subscriber to an exchange to deactivate or activate a service, record or solicit an acknowledgement or clear data in the subscriber line data area from the exchange. As an illustration, a user may enable or disable STD service on his line by using a command. A command may be or not have data related with this. The number of digits in the data, while present, may vary depending on the command. As an effect, subscriber commands are designed to be of variable length requiring the use of an end-of-command symbol.


Related Discussions:- Explain cpu based exchange

Convert following decimal numbers into 9s & 10s complement, Q. Convert the ...

Q. Convert the following decimal numbers into 9s & 10s complement: 1) 3654 2) 99 3) 18.293 Q. Convert the following binary numbers into 1s& 2s complement: 1) 1101

Define object oriented and structured development, How object oriented deve...

How object oriented development is dissimilar from structured development object oriented development is dissimilar from structured development of the system. In the structure

Octave project, i need help with an octave program

i need help with an octave program

What are the properties exposed by activex controls, An ActiveX control has...

An ActiveX control has four types of properties: 1. Stock:-> These are standard properties supplied to each control, such as font / color. The developer must activate stock pro

Send a report to the printer, How to send a report to the printer instead o...

How to send a report to the printer instead of displaying it on the screen? We can send a report to the printer instead of displaying it on the screen.  To do this, use the key

Classify process and differentiate program, Classify Process, differentiate...

Classify Process, differentiate program, process A process maybe concerned to be a program being run. A program isn't a process of itself; it's a passive Entity while the proce

What are the objectives of uml, What are the Objectives of UML tra...

What are the Objectives of UML trace development of UML; recognize and describe notations for object modelling using UML; describe a variety of structural and be

What is a cooperation model, What is A cooperation model A cooperation ...

What is A cooperation model A cooperation model defines the way interdependencies are established by cooperative interactions. We recognize two basic roles services can play: c

Advantages and disadvantages of public key cryptography, What are the advan...

What are the advantages and disadvantages of public key cryptography? Advantages and Disadvantages: Improved security and convenience: private keys never require be trans

Define miss rate, Define miss rate? It is the number of misses' states ...

Define miss rate? It is the number of misses' states as a fraction of attempted accesses.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd